0% found this document useful (0 votes)
35 views

This Image: Connection

Command prompt can be used to: 1. View your IP address and network connection details. 2. Check if unknown devices are connected to your wifi network. 3. Scan active network connections to your computer to detect any unauthorized access from external computers.

Uploaded by

Udit Prakash
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

This Image: Connection

Command prompt can be used to: 1. View your IP address and network connection details. 2. Check if unknown devices are connected to your wifi network. 3. Scan active network connections to your computer to detect any unauthorized access from external computers.

Uploaded by

Udit Prakash
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

1- Make Folders that you cannot delete.

2- Create Matrix falling code effect Have you watched The Matrix? Of course, you have. Then, you already now what ! a" tal in# a$out. !n case you still don%t now what ! "ean, ta e a loo at this i"a#e& 'ou can create the sa"e effect in co""and (ro"(t usin# )ust a few lines of code.

*- Watch ASCII version of the Star Wars Episode IV ovie +ur(rised yet? 'ou can watch an ,+-!! version of the full +tar .ars /(isode !0 Movie ri#ht in your co""and (ro"(t window. 1ust o(en co""and (ro"(t, ty(e a s"all code and the "ovie will start (layin# i""ediately 2- Shutdo!n your co puter giving a funny reason .hat if your co"(uter shuts down sayin# that it is tired and doesn%t want to wor any"ore? !t would $e fun, wouldn%t it. 3- "no! your I# address$ %&S Server's address and a lot ore a(out your Internet Connection -o""and 4ro"(t can even let you now your !4 address. 1ust ty(e ipconfig) all in the co""and (ro"(t and (ress /nter. ,lon# with your !4 address and 56+ servers, co""and (ro"(t will also return a ton of infor"ation li e your host na"e, (ri"ary 56+ suffix, node ty(e, whether !4 7outin# ,.ins 4roxy, and 5H-4 are ena$led, your networ ada(ter%s descri(tion, your (hysical 8M,-9 address etc . :- "no! if your neigh(ours are stealing your Wifi connection

-o""and 4ro"(t can let you now if so"eone is connected to your ;ocal ,rea -onnection and usin# it. 1ust follow the ste(s<19 O(en your $rowser and visit htt(<==1>2.1:?.1.1 or htt(<==1>2.1:[email protected] de(endin# on your router. 29 Aind the ta$ that "entions ,ttached 5evices or so"ethin# si"ilar. *9 Aind the co"(uter na"e, !4 address and M,- ,ddress 8so"eti"es called 4hysical ,ddress or Hardware ,ddress9 of your co"(uter usin# the (revious tric . 2 9-o"(are it with those dis(layed $y your router in +te( 2. !f you notice so"e stran#e devices, then your nei#h$our has $een snea in# in on your internet connection and it is $est

to ensure that your B- "no! if so eone is hacking your co puter) *race a +acker

.ant to now if so"eone is hac in# your co"(uter? -o""and 4ro"(t can hel( you find if so"eone you don%t now is connected to your co"(uter stealin# (rivate data. 1ust execute netstat ,a and the co""and (ro"(t will return a list of co"(uters that your co"(uter is connected to. !n the results returned, 4roto colu"n #ives the ty(e of data trans"ission ta in# (lace 8T-4 or C549 , ;ocal address colu"n #ives the (ort with which your co"(uter is connected to an external co"(uter and the Aorei#n ,ddress colu"n #ives the external co"(uter you are connected to alon# with the (ort $ein# used for the connection. +tate #ives the state of the connection 8whether a connection is actually esta$lished, or waitin# for trans"ission or is Ti"ed Out9. These tric s wor on Windows 8, Windows 7, Windows Vista, Windows XP and all (revious versions of .indows.

You might also like